Sign in
ICA3PP (4)
2015
2016
2017
2018
2015
2018
Keyphrases
Publications
2018
Jing Lei
,
Qingqi Pei
,
Xuefeng Liu
,
Wenhai Sun
A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability.
ICA3PP (4)
(2018)
Yingjie Gu
,
Xiaolin Gui
,
Pan Xu
,
Ruowei Gui
,
Yingliang Zhao
,
Wenjie Liu
A Secure and Targeted Mobile Coupon Delivery Scheme Using Blockchain.
ICA3PP (4)
(2018)
Rui Xu
,
Hui Li
,
Huayu Zhang
Reliable Content Delivery in Lossy Named Data Networks Based on Network Coding.
ICA3PP (4)
(2018)
Nabeil Eltayieb
,
Rashad Elhabob
,
Alzubair Hassan
,
Fagen Li
Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test.
ICA3PP (4)
(2018)
Wenli Sun
,
Zoe Lin Jiang
,
Jun Zhang
,
Siu-Ming Yiu
,
Yulin Wu
,
Hainan Zhao
,
Xuan Wang
,
Peng Zhang
Outsourced Privacy Preserving SVM with Multiple Keys.
ICA3PP (4)
(2018)
Wei Shao
,
Hang Li
,
Mengqi Chen
,
Chunfu Jia
,
Chunbo Liu
,
Zhi Wang
Identifying Bitcoin Users Using Deep Neural Network.
ICA3PP (4)
(2018)
Wen-Tao Tan
,
Hong Wang
,
Lutong Wang
,
Xiaomei Yu
Integrated Prediction Method for Mental Illness with Multimodal Sleep Function Indicators.
ICA3PP (4)
(2018)
Dulin
,
Zhiwei Zhang
,
Shichong Tan
,
Jianfeng Wang
,
Xiaoling Tao
An Associated Deletion Scheme for Multi-copy in Cloud Storage.
ICA3PP (4)
(2018)
Yanhua Zhang
,
Yong Gan
,
Yifeng Yin
,
Huiwen Jia
Attribute-Based VLR Group Signature Scheme from Lattices.
ICA3PP (4)
(2018)
Rang Zhou
,
Xiaosong Zhang
,
Xiaofen Wang
,
Guowu Yang
,
Wanpeng Li
Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data.
ICA3PP (4)
(2018)
Ao Yin
,
Chunkai Zhang
,
Zoe Lin Jiang
,
Yulin Wu
,
Xing Zhang
,
Keli Zhang
,
Xuan Wang
PPLDEM: A Fast Anomaly Detection Algorithm with Privacy Preserving.
ICA3PP (4)
(2018)
Chundong Wang
,
Likun Zhu
,
Liangyi Gong
,
Zheli Liu
,
Xiu-liang Mo
,
Wenjun Yang
,
Min Li
,
Zhaoyang Li
Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer.
ICA3PP (4)
(2018)
Zhili Chen
,
Xianyue Bao
,
Zuobin Ying
,
Ximeng Liu
,
Hong Zhong
Differentially Private Location Protection with Continuous Time Stamps for VANETs.
ICA3PP (4)
(2018)
Wencong Han
,
Quanxin Zhang
,
Chongzhi Gao
,
Jingjing Hu
,
Fang Yan
Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware.
ICA3PP (4)
(2018)
Mengdi Liu
,
Guangquan Xu
,
Jun Zhang
,
Rajan Shankaran
,
Gang Luo
,
Xi Zheng
,
Zonghua Zhang
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems.
ICA3PP (4)
(2018)
Yinghui Zhang
,
Jiangfan Zhao
,
Dong Zheng
,
Kaixin Deng
,
Fangyuan Ren
,
Xiaokun Zheng
Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing.
ICA3PP (4)
(2018)
Yulin Wu
,
Xuan Wang
,
Zoe Lin Jiang
,
Xuan Li
,
Jin Li
,
Siu-Ming Yiu
,
Zechao Liu
,
Hainan Zhao
,
Chunkai Zhang
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
ICA3PP (4)
(2018)
Zhe Chen
,
Chunfu Jia
,
Tongtong Lv
,
Tong Li
Harden Tamper-Proofing to Combat MATE Attack.
ICA3PP (4)
(2018)
Yujie Huang
,
Quan Zhang
,
Yujie Cai
,
Ming-e Jing
,
Yibo Fan
,
Xiaoyang Zeng
Dynamic Task Scheduler for Real Time Requirement in Cloud Computing System.
ICA3PP (4)
(2018)
Lanlan Dong
,
Guanjun Liu
,
Dongming Xiang
Verifying CTL with Unfoldings of Petri Nets.
ICA3PP (4)
(2018)
Jiahao Liang
,
Lin You
Secure Biometric Authentication Scheme Based on Chaotic Map.
ICA3PP (4)
(2018)
Jiayu Tan
,
Jian Wang
Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine.
ICA3PP (4)
(2018)
Binod Kumar Adhikari
,
Wanli Zuo
,
Ramesh Maharjan
,
Lin Guo
Sensitive Data Detection Using NN and KNN from Big Data.
ICA3PP (4)
(2018)
Bin He
,
Jin Wang
,
Jingya Zhou
,
Kejie Lu
,
Lingzhi Li
,
Shukui Zhang
The Design and Implementation of Random Linear Network Coding Based Distributed Storage System in Dynamic Networks.
ICA3PP (4)
(2018)
Zhendong Wu
,
Yihang Xia
User Password Intelligence Enhancement by Dynamic Generation Based on Markov Model.
ICA3PP (4)
(2018)
David Madsen
,
Wenjuan Li
,
Weizhi Meng
,
Yu Wang
Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA.
ICA3PP (4)
(2018)
Mehdi Gheisari
,
Guojun Wang
,
Shuhong Chen
,
Hamidreza Ghorbani
IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking.
ICA3PP (4)
(2018)
Jianwei Liu
,
Jianhua Fan
Access Delay Analysis in String Multi-hop Wireless Network Under Jamming Attack.
ICA3PP (4)
(2018)
Qun Li
,
Zhenxiang Chen
,
Qiben Yan
,
Shanshan Wang
,
Kun Ma
,
Yuliang Shi
,
Lizhen Cui
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion.
ICA3PP (4)
(2018)
Chuxin Wu
,
Peng Zhang
,
Hongwei Liu
,
Zehong Chen
,
Zoe Lin Jiang
An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control.
ICA3PP (4)
(2018)
Jinlong Wang
,
Jing Liu
,
Lijuan Zheng
Construction of VMI Mode Supply Chain Management System Based on Block Chain.
ICA3PP (4)
(2018)
Pei-ming Guo
,
Jianping Wu
One-Sided Communication in Coarray Fortran: Performance Tests on TH-1A.
ICA3PP (4)
(2018)
Zoe Lin Jiang
,
Ning Guo
,
Yabin Jin
,
Jiazhuo Lv
,
Yulin Wu
,
Yating Yu
,
Xuan Wang
,
Siu-Ming Yiu
,
Junbin Fang
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
ICA3PP (4)
(2018)
Yu Zhang
,
Jiankang Chen
A Scalable Pthreads-Compatible Thread Model for VM-Intensive Programs.
ICA3PP (4)
(2018)
Yujia Hu
,
Hang Shen
,
Guangwei Bai
,
Tianjing Wang
Privacy-Preserving Task Allocation for Edge Computing Enhanced Mobile Crowdsensing.
ICA3PP (4)
(2018)
Tianyu Wang
,
Zhiyong Zhang
,
Mengying Zhao
,
Ke Liu
,
Zhiping Jia
,
Jianping Yang
,
Yang Wu
-RAID: A Novel Hybrid RAID Architecture Towards High Reliability.
ICA3PP (4)
(2018)
Siyi Lv
,
Yanyu Huang
,
Bo Li
,
Yu Wei
,
Zheli Liu
,
Joseph K. Liu
,
Dong Hoon Lee
Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique.
ICA3PP (4)
(2018)
Haojun Ai
,
Weiyi Huang
,
Yuhong Yang
,
Liang Liao
The BLE Fingerprint Map Fast Construction Method for Indoor Localization.
ICA3PP (4)
(2018)
Qiang Wang
,
Fucai Zhou
,
Su Peng
,
Zifeng Xu
Verifiable Outsourced Computation with Full Delegation.
ICA3PP (4)
(2018)
Anran Liu
,
Zhenxiang Chen
,
Shanshan Wang
,
Lizhi Peng
,
Chuan Zhao
,
Yuliang Shi
A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic.
ICA3PP (4)
(2018)
Longchuan Yan
,
Wantao Liu
,
Yin Liu
,
Songlin Hu
CGAN Based Cloud Computing Server Power Curve Generating.
ICA3PP (4)
(2018)
Swati Jain
,
Priyanka Sharma
,
Jaina Bhoiwala
,
Sarthak Gupta
,
Pramit Dutta
,
Krishan Kumar Gotewal
,
Naveen Rastogi
,
Daniel Raju
Deep Q-Learning for Navigation of Robotic Arm for Tokamak Inspection.
ICA3PP (4)
(2018)
Ximing He
,
Sheng Ma
,
Wenjie Liu
,
Sijiang Fan
,
Libo Huang
,
Zhiying Wang
,
Zhanyong Zhou
VISU: A Simple and Efficient Cache Coherence Protocol Based on Self-updating.
ICA3PP (4)
(2018)
Qingfeng Du
,
Tiandi Xie
,
Yu He
Anomaly Detection and Diagnosis for Container-Based Microservices with Performance Monitoring.
ICA3PP (4)
(2018)
Xu Li
,
Guojun Wang
,
Saqib Ali
,
QiLin He
Android Malware Detection Using Category-Based Permission Vectors.
ICA3PP (4)
(2018)
Jiajia Sun
,
Jinbao Gao
,
Yu-an Tan
,
Yu Zhang
,
Xiao Yu
A Java Code Protection Scheme via Dynamic Recovering Runtime Instructions.
ICA3PP (4)
(2018)
Yueyue Zhou
,
Tao Xiang
,
Xiaoguo Li
Efficient and Privacy-Preserving Query on Outsourced Spherical Data.
ICA3PP (4)
(2018)
Jiaqing Dong
,
Kai Wang
,
Yongqiang Lyu
,
Libo Jiao
,
Hao Yin
InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels.
ICA3PP (4)
(2018)
Miaomiao Tian
,
Shibei Ye
,
Hong Zhong
,
Lingyan Wang
,
Fei Chen
,
Jie Cui
Identity-Based Proofs of Storage with Enhanced Privacy.
ICA3PP (4)
(2018)
volume 11337, 2018
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV
ICA3PP (4)
11337 (2018)